Tải bản đầy đủ
Go to Windows Server 2008 Virtual Maclune, and click the Start button.

Go to Windows Server 2008 Virtual Maclune, and click the Start button.

Tải bản đầy đủ

Module 05 - System Hacking

Lab Analysis
Analyze and document die results related to the lab exercise.

P L E A S E TALK TO Y OU R I N S T R U C T O R IF YOU HAVE Q U E S T I O N S
R E L A T E D T O T H I S L AB .

T o o l/U tility

Information C ollected /O b jectives Achieved
M achine N a m e : Windows server 2008

C H N T P W .IS O

O u tp u t: Log into Windows Server 2008 without
entering the user name and password

Q uestions
1.

How do

you

configure CHNTPW.ISO

111

Windows Server 2008 Virtual

Machine Settings?

Internet C onnection Required
□ Yes

0 No

P latform S upported
0 C lassroom

C E H L ab M anual Page 391

0 !Labs

E th ica l H a ck in g and C ounterm easures Copyright © by EC-Couucil
All Rights Reserved. Reproduction is Stricdy Prohibited.

Module 05 - System Hacking

Lab

User System Monitoring and
Surveillance Needs Using Spytech
SpyAgent
Spytech SpyAgent is powerful computer spy sojhrare that allons yon to monitor
everything users do on your computer, in total stealth. SpyAgent provides a large
array of essential computer monitoringfeatures, as well as website, application, and
chat client blocking, lockdown scheduling, and remote delivery of logs via email or
FTP.
I CON

Lab Scenario

KEY

/ Valuable
information
Test your
knowledge


Web exercise

m

Workbook review

Today, employees are given access to computer, telephone, and other electronic
communication equipment. Email, instant messaging, global positioning systems,
telephone systems, and video cameras have given employers new ways to monitor
the conduct and performance o f their employees. Many employees also are given
laptop computer and wireless phones they can take home and use for business
outside the workplace. Whether an employee can claim a reasonable expectation of
privacy when using such company-supplied equipment 111 large part depends upon
the steps die employer has made to minimize that expectation.
111 tins lab, we explain monitoring employee or suident activity using Spytech
SpyAgent.

& Tools
dem onstrated in
this lab are
available in
D:\CEHTools\CEHv8
Module 05 System
Hacking

Lab Objectives
The objective of tins lab is to help smdents use Spytech and the SpyAgent tool.
After completing tins lab, smdents will be able to:


Install and configure Spytech SpyAgent



Monitor keystrokes typed, w eb sites visited, and Internet Traffic Data

Lab Environment
To perform the lab, you need:
C E H L ab M an u al Page 392

E th ica l H a ck in g and C ounterm easures Copyright © by EC-Council
All Rights Reserved. Reproduction is Stricdy Prohibited.

Module 05 - System Hacking



A computer running Windows Server 2012



Administrative pnvileges to install and m n tools



Run tins tool in Windows Server 2012



You can also download Spytech SpyAgent from http://www.spytechw eb.com /spyagent.shtml



II you decided to download the latest version, screenshots may differ

Lab Duration
Time: 15 Minutes

Overview of Spytech SpyAgent
SpyAgent is a powerful solution diat can log all keystrokes, emails, windows,
websites, applications, Internet connections, chat conversations, passwords, print
jobs, documents viewed, and even screenshots. SpyAgent runs 111 complete stealth
with optional email delivery and logging and lockdown scheduling. SpyAgent also
features powerful filtering and access control featares, such as Chat Blocking (to
restnct access to chat software), Application Blocking (to prevent specific
applications from being executed), and Website Filtering.

Lab Tasks
The basic idea in diis section is to:
1. Navigate to D:\CEH-Tools\CEHv8 Module 05 System
Hacking\Keyloggers\Spytech SpyAgent

TASK 1
Installation of
Spytech SpyAgent

2.

Double-click Setup.exe. You will see die following window. Click Next.
Spytech SpyAgent Setup

m

You can download
the spytech SpyAgent from

http:/ / uww.spytech-web.com

Next >

Cancel

FIGURE 14.1: Installation o f Spytech SpyAgent

C E H L ab M anual Page 393

E th ical H a ck in g and C ounterm easures Copyright © by EC-Council
All Rights Reserved. Reproduction is Stricdy Prohibited.

Module 05 - System Hacking

3. Tlie W elcome wizard of Spytech SpyAgent setup program window appears;
read die instructions and click Next.
Welcome
Welcome to the Spytech SpyAgent Setup program. This program will install
Spytech SpyAgent on your computer.
It is strongly recommended that you exit all Windows programs before
running this Setup program.
Click Cancel to quit Setup and then close any programs you have running.
Click Next to continue with the Setup program.
WARNING: This program is protected by copyright law and international
treaties.

fA g m ?
Unauthorized reproduction or distribution of this program, or any portion of it,
may result in severe civil and criminal penalties, and will be prosecuted to
the maximum extent possible under law.

< Back

Next >

Cancel

FIGURE 14.2: Installation wizard of Spytech SpyAgent

4.

Tlie Important N otes window appears, read die note and click Next
Important Notes
Spytech SpyAgent
Build Version 7.56.12
Copyright Spytech Software and Design, Inc. 2000-2012.

m

Active M ode: this
option allows SpyAgent to
be started in monitoring
mode when it is opened no need for manually
starting its monitoring

www. spy tech-web. com
What is Spytech SpyAgent?
Spytech SpyAgent is a powerful and easy-to-use software utility that
allows you to log all keystrokes typed, windows and applications
launched, websites visited, passwords used, icq/msn/yahoo/aim
conversations, and even all internet connections made. All logs are
easily viewed with the built in log viewers and can be saved to a
convenient, easily viewed text format for email transfer(built in) or
printouts. SpyAgent can also capture all emails, as well as capture
screenshots of the desktop at set time intervals.
SpyAgent can be ran on windows startup in active monitoring mode

< Back

Next >

Cancel

FIGURE 14.3: Installation wizard

C E H L ab M anual Page 394

5.

The Softw are L icen se A greem ent window appears; you m ust accept
the agreement to install Spytech SpyAgent.

6.

Click Y es to continue.

E tliical H a ck in g and C ounterm easures Copyright © by EC-Council
All Rights Reserved. Reproduction is Stricdy Prohibited.

Module 05 - System Hacking

Software License Agreement
Please read the following License Agreement. Press the PAGE DOWN key to see the rest of the
agreement.

License
1. You may use the program on a single computer at one time. You may not copy the program and
accompanying materials except for backup purposes to use in support of using the program on a single
machine at one time.
2. You may only install this software on a computer that you own, or on a computer from which you
have consent of the owner to install this software.
3. You may not make copies of the program for sale or distribution.
4.

This software is copyrighted, and all rights therein are reserved for Spytech Software. Purchase of

Do you accept all the terms of the preceding License Agreement? If you choose No, Setup will close. T 0
install this product, you must accept this agreement.

Print

< Back

Yes

No

FIGURE 14.4: Select the Agreement

7.

Choose die Destination Location to install Spytech SpvAgent.

8.

Click Next to continue installation.

‫ודו‬

Choose Destination Location
Setup will install Spytech SpyAgent in the following directory.

m

T 0 install to this directory, click Next.

Stealth M ode: this
option allows SpyAgent to
run in total stealth.
Combined with 'Active
Mode' the software will
load and run in monitoring
mode in complete stealth

T 0 install to a different directory, click Browse and select another directory.
You can choose not to install Spytech SpyAgent, by clicking Cancel to exit
Setup.

Destination Directory
C:\Program Files (x8G)\Spytech SoftwareVSpytech Sp

Browse..

Space Required: 3048 K
S pace Available: 5231736 K

< Back

Next >

Cancel

FIGURE 14.5: Selecting folder for installation

9.

Select SpyAgent installation type, and select Administrator/Tester die
setup type.

10. Click Next.

C E H L ab M anual Page 395

E th ical H a ck in g and C ounterm easures Copyright © by EC-Council
All Rights Reserved. Reproduction is Stricdy Prohibited.